-
FORUMS
- Raisina Dialogue
- Cape Town Conversation
- The Energy Transition Dialogues
- CyFy
- CyFy Africa
- Kigali Global Dialogue
- BRICS Academic Forum
- Colaba Conversation
- Asian Forum on Global Governance
- Dhaka Global Dialogue
- Kalpana Chawla Annual Space Policy Dialogue
- Tackling Insurgent Ideologies
- Climate Action Champions Network
स्टार्टअप इंडिया में चीन का निवेश: रुझान और विवाद
Chinese investments in Indian startups: Trends and controversies
A digital agenda for India's G20 presidency
भारत के श्रम बाज़ार को नुक़सान से बचाना: डिजिटल अर्थव्यवस्था में रोज़गार की संभावना को खोलना
Thank you for your concern, Twitter—now fall in line
धार्मिक और साइबर क्षेत्र में मिथकों का रहस्य: 5जी और हुवावे पर प्रतिबंध
Shockproofing India’s labour market: Unlocking the livelihoods potential in the platform economy
The ‘government’ of Twitter has to follow the government of India, period
Towards Informed Discourse and Voter Education: A Critique of E-Campaigns
The equities of telco cyber exploitation: 5G and the Huawei ban
Democracy: Debugging in process
Exploring the prospects for higher education
India Draws a Line in the 5G Sand
The aftermath of Article 370: A review of technological developments in Kashmir
A sustainable internet: Missing pieces to a healthy future
The Great Game 2.0 in Asia: Stakes go up
The SolarWinds hack pokes holes in Defend Forward
Excluding Huawei from India is part of a policy continuum
मौजूदा समय के मुताबिक़ डाटा सुरक्षा क़ानून
The tyranny of vanity metrics and impractical tech solutions in India’s COVID-19 second wave
क्या 5G ट्रायल में #Huawei को बाहर करना, भारत के क्रिटिकल नेशनल सिक्योरिटी इंफ्रास्ट्रक्चर के लिए अपरिहार्य बन गया था?
No Huawei in 5G is a start, No China in critical infrastructure should be next
Future visionaries: India-EU cooperation for digital transitions
The infodemic: Regulating the new public square
Digital biases: The chimaera of equality and access
US-Japan partnership on 6G should co-opt the Quad and beyond
Commoditisation of broadband connectivity: A call to action
Exploring the gender dimensions of CVE online